Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,574 skills, Security & Compliance has 1631 skills

Categories

Showing 12 of 1631 skills

Per page
Downloads
Sort
Security & Complianceyaklang/hack-skills

xslt-injection

XSLT injection testing: processor fingerprinting, XXE and document() SSRF, EXSLT write primitives, PHP/Java/.NET extension RCE surfaces. Use when user-controlled XSLT/stylesheet input or transform endpoints are in scope.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

csv-formula-injection

CSV/spreadsheet formula injection (DDE, Excel/LibreOffice, Google Sheets IMPORT*). Use when exports, imports, or user fields feed spreadsheets or reporting tools.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

xxe-xml-external-entity

XXE playbook. Use when XML, SVG, OOXML, SOAP, or parser-driven imports may resolve external entities, files, or internal network resources.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

injection-checking

Entry P1 category router for injection testing. Use when routing between XSS, SQLi, SSRF, XXE, SSTI, command injection, and NoSQL injection workflows based on how attacker-controlled input is consumed.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

graphql-and-hidden-parameters

GraphQL and hidden parameter testing playbook. Use when exploring introspection, batching, undocumented fields, hidden parameters, schema abuse, and GraphQL authorization gaps.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

saml-sso-assertion-attacks

SAML SSO assertion attack playbook. Use when testing signature validation, assertion wrapping, audience restrictions, ACS handling, XML trust boundaries, and enterprise SSO flaws.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

ssti-server-side-template-injection

SSTI playbook. Use when template expressions, server-side rendering, preview features, or templating engines may evaluate attacker-controlled content.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

dependency-confusion

Supply-chain testing via package-manager dependency confusion: when internal package names resolve to attacker-controlled public registries, leading to malicious install and script execution. Use for npm/pip/gem/Maven/Composer/Docker manifest review and authorized red-team supply-chain exercises.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

web-cache-deception

Web cache deception and poisoning playbook. Use when CDN, reverse proxy, or application caching may serve sensitive authenticated content to other users due to path confusion or cache key manipulation.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

crlf-injection

CRLF injection playbook. Use when user input reaches HTTP response headers, Location redirects, Set-Cookie values, or log files where carriage-return/line-feed characters can split or inject content.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

cors-cross-origin-misconfiguration

CORS misconfiguration testing playbook. Use when analyzing cross-origin trust, credentialed browser reads, origin reflection, preflight policy bugs, and browser-based access to authenticated APIs.

🇺🇸|EnglishTranslated
6
Security & Complianceyaklang/hack-skills

file-access-vuln

Entry P1 category router for file access and upload workflows. Use when testing download endpoints, file paths, local file inclusion, upload flows, preview pipelines, archive extraction, or storage and sharing boundaries.

🇨🇳|ChineseTranslated
6
1...3536373839...136
Page